You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-6
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ description: >-
6
6
7
7
# Hacker's Rest
8
8
9
-
These are my publicly accessible notes from various sources for penetration testing, red-teaming, OSCP, Capture the Flag \(CTF\) challenges, and my [Vulnhub](https://www.vulnhub.com/)/ [Hack the Box](https://hackthebox.eu) machine [write-ups](https://zweilosec.github.io/).
9
+
These are my publicly accessible notes from various sources for penetration testing, red-teaming, OSCP, Capture the Flag (CTF) challenges, and my [Vulnhub](https://www.vulnhub.com/)/ [Hack the Box](https://hackthebox.eu) machine [write-ups](https://zweilosec.github.io/).
10
10
11
11
{% hint style="warning" %}
12
12
Warning - These notes are largely unformatted right now. They are based on my way of learning things - by reading, doing, studying, exploring, and taking notes. Cleaning up and formatting comes later.
@@ -24,7 +24,7 @@ Warning - These notes are largely unformatted right now. They are based on my wa
24
24
25
25
If you would like to give suggestions or even commit changes to these pages feel free to head to my GitHub page at:
Copy file name to clipboardExpand all lines: hacking-methodology.md
+17-21
Original file line number
Diff line number
Diff line change
@@ -3,26 +3,25 @@
3
3
{% hint style="success" %}
4
4
Hack Responsibly.
5
5
6
-
Always ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
6
+
Always ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.  
7
7
{% endhint %}
8
8
9
9
Not much here yet...please feel free to contribute at [https://www.github.com/zweilosec](https://github.com/zweilosec)
10
10
11
-
## MITRE ATT&CK
11
+
## MITRE ATT\&CK
12
12
13
13
{% embed url="https://attack.mitre.org" %}
14
14
15
15
|[Initial Access](https://attack.mitre.org/tactics/TA0001)|[Execution](https://attack.mitre.org/tactics/TA0002)|[Persistence](https://attack.mitre.org/tactics/TA0003)|[Privilege Escalation](https://attack.mitre.org/tactics/TA0004)|[Defense Evasion](https://attack.mitre.org/tactics/TA0005)|[Credential Access](https://attack.mitre.org/tactics/TA0006)|[Discovery](https://attack.mitre.org/tactics/TA0007)|[Lateral Movement](https://attack.mitre.org/tactics/TA0008)|[Collection](https://attack.mitre.org/tactics/TA0009)|[Command and Control](https://attack.mitre.org/tactics/TA0011)|[Exfiltration](https://attack.mitre.org/tactics/TA0010)|[Impact](https://attack.mitre.org/tactics/TA0040)|
0 commit comments